A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
linkmonkey239
Highly Voted 7 months agocj207800
Most Recent 2 weeks agokmicic77
3 weeks, 3 days agoybyttv
2 weeks, 6 days agoSusan4041
2 months, 2 weeks agozecomeia_007
7 months, 1 week agoCimoooooo
7 months, 1 week agoChopSNap
7 months, 1 week ago